Analysis of security evaluation methods for chaos-based encryptions.
Over the past years a lot of different chaos-based image encryption algorithms has been proposed. In various experiments and analysis it is shown by the authors, that their encryption algorithm justifies a high security performance. This is for example done by analyzing the statistical behaviors of an encrypted image, the key sensitivity or the key space of the algorithm. There are common ways and methods to do this. Our assertion is, that just passing these tests does not guarantee a strong encryption algorithm or a high security performance. We show this by implementing obviously insecure algorithms and compare the results with well known chaos-based encryption schemes.
This is as easy as
cd /path/to/seth/
make
The executable can be found in
seth/build/
Call Seth like this
./build/seth <flags>
List of available flags
-h
help-l
produce less output files (only final result)-d <directory>
directory of source images-t {<evaluation method>}
list of evaluation methods to executed (min. 1)-e {<encryption>}
list of encryptions to executed (min. 1)-k <number of keys>
number of random generated keys applied on each image (default: 1)
all
runs all testsnpcr
NPCRuaci
UACIgrsh
gray scale histogramgrsv
gray scale histogram valuekese
key sensitivitycprtv
correlation property test verticalcprth
correlation property test horizontalcprtd
correlation property test diagonalseqts
sequence test single bitseqtd
sequence test double bitentri
entropy of imagenist
NIST test suite
all
runs all encryptionsorigin
no encryption (use original image)arnold
Arnold cat's mapbaker
Baker's mapbaker-sub
baker's map in substitution modexor-otp-rc4-msb
XOR OTP RC4 in MSB modexor-otp-rc4-pix
XOR OTP RC4 in pixel modexor-otp-cstd-msb
XOR OTP CSTD in MSB modexor-otp-cstd-pix
XOR OTP CSTD in pixel modexor-key-msb-8
XOR short-key in MSB mode 8 bit keyxor-key-pix-8
XOR short-key in pixel mode 8 bit keyxor-key-msb-32
XOR short-key in MSB mode 32 bit keyxor-key-pix-32
XOR short-key in pixel mode 32 bit keyxor-key-msb-256
XOR short-key in MSB mode 256 bit keyxor-key-pix-256
XOR short-key in pixel mode 256 bit keyxor-followers-8
XOR followers 8 bit keyxor-followers-32
XOR followers 32 bit keyxor-followers-256
XOR followers 256 bit key2d-log-map-256
2 dimensional logistic chaotic map 256 bit key
Copyright (c) 2016, the Seth Project Authors. All rights reserved. Please see the AUTHORS file for details.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
-
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
-
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.